Advertisement

Abstract

Current developments in information technology are leading to increasing capture and storage of information about people and their activities. This raises serious issues about the preservation of privacy. In this paper we examine why these issues are particularly important in the introduction of ubiquitous computing technology into the working environment. Certain problems with privacy are closely related to the ways in which the technology attenuates natural mechanisms of feedback and control over information released. We describe a framework for design for privacy in ubiquitous computing environments and conclude with an example of its application.

Keywords

Human Factor Ubiquitous Computing Public Area Computer Support Cooperative Work Media Space 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R. (1991): The Ethics of Research into Invasive Technologies. Technical Report, EPC-91–107, Rank Xerox EuroPARC, Cambridge, UK, 1991.Google Scholar
  2. Bellotti, V. (1993): “Integrating Theoreticians’ and Practitioners’ Perspectives with Design Rationale” in Proceedings of INTERCHI’93, Conference on Human Factors in Computing Systems, Amsterdam, The Netherlands, April, 1993.Google Scholar
  3. Buxton, W. and Moran, T. (1990): “EuroPARC’s Integrated Interactive Intermedia Facility (IIIF): Early Experiences”. IFIP Conference on Multi-User Interfaces and Applications, Herakleion, Crete, September 1990.Google Scholar
  4. Clarke, R. (1988): “Information Technology and Dataveillance”, Communications of the ACM, 31, 5, 1988, pp. 498–512.CrossRefGoogle Scholar
  5. Cool, C., Fish, R., Kraut, R. and Lowery, C. (1992): “Iterative Design of Video Communication Systems” in Proc. CSCW’92. ACM Conference on Computer-Supported Cooperative Work, Toronto, Canada, October-November, 1992, pp. 25–32.Google Scholar
  6. Dourish, P. (1991): “Godard: A Flexible Architecture for A/V Services in a Media Space” Technical Report EPC-91–134, Rank Xerox EuroPARC, Cambridge, UK, 1991.Google Scholar
  7. Dourish, P. and Bly, S. (1992): “Portholes: Supporting Awareness in Distributed Work Groups” in Proc. ACM Conference on Human Factors in Computing Systems, CHI’92, Monterey, California, May 1992. pp. 541–547.Google Scholar
  8. Dourish, P. (1993): “Culture and Control in a Media Space”, in Proc. European Conference on Computer-Supported Cooperative Work ECSCW’93, Milano, Italy, September, 1993.Google Scholar
  9. Dunlop, C. and Kling, R. (1991): Computerization and Controversy: Value Conflicts and Social Choices. Academic Press, Inc., 1991.Google Scholar
  10. Eldridge, M., Lamming, M. and Flynn, M. (1992): “Does a Video Diary Help Recall?” in People and Computers VII, Proceedings of the HCI’92 Conference, York, UK, September, 1992, pp. 257–269.Google Scholar
  11. Fish, R., Kraut, R. and Root, R. (1992): “Evaluating Video as a Technology for Informal Communication” in Proc. ACM Conference on Human Factors in Computing Systems, CHI ‘92, Monterey, California, May, 1992, pp. 37–47.Google Scholar
  12. Gaver, W. (1991): “Sound Support for Collaboration” in Proc. European Conference on Computer-Supported Cooperative Work, ECSCW’91, Amsterdam, The Netherlands, September, 1991, pp. 293–308.Google Scholar
  13. Gaver, B., Moran, T., MacLean, A., Lövstrand, L., Dourish, P., Carter K. and Buxton, B. (1992): “Realising a Video Environment: EuroPARC’s RAVE System” in Proc. ACM Conference on Human Factors in Computing Systems, CHI ‘92, Monterey, California, May 1992, pp. 27–35.Google Scholar
  14. Gaver, B. (1992): “The Affordance of Media Spaces for Collaboration” in Proc. CSCW’92. ACM Conference on Computer-Supported Cooperative Work, Toronto, Canada, October-November, 1992, pp. 17–24.Google Scholar
  15. Goffman, E., Behaviour in Public Places. The Free Press, 1963.Google Scholar
  16. Harper, R., Lamming, M. and Newman, W. (1992): “Locating Systems at Work: Implications for the Development of Active Badge Applications”, Interacting with Computers, 4, 3, 1992, pp.343–363.CrossRefGoogle Scholar
  17. Heath, C. and Luff, P. (1991): “Disembodied Conduct: Communication through Video in a Multi-Media Office Environment” in Proc. ACM Conference on Human Factors in Computing Systems, CHI’91, New Orleans, Louisiana, April-May 1991, pp. 99–103.Google Scholar
  18. Heath, C. and Luff, P. (1992): “Collaboration and Control: Crisis Management and Multimedia Technology in London Underground Line Control Rooms”, Computer Supported Cooperative Work (CSCW), 1, 1992, 69–94.CrossRefGoogle Scholar
  19. Hindus, D. and Schmandt, C. (1992): “Ubiquitous Audio: Capturing Spontaneous Collaboration” in Proc. ACM Conference on Computer-Supported Cooperative Work, CSCW’92, Toronto, Canada, October-November, 1992, pp. 210–217.Google Scholar
  20. Ladd, J. (1991): “Computers and Moral Responsibility: A Framework for Ethical Analysis” in C. Dunlop & R. Kling (eds.) Computerization and Controversy: Value Conflicts and Social Choices, Academic Press Inc., 1991, pp. 664–675.Google Scholar
  21. Lamming, M. and Newman W. (1991): “Activity-Based Information Retrieval Technology in Support of Personal Memory”, EuroPARC Technical Report, EPC-91–103.1, 1991.Google Scholar
  22. Lampson, B., Paul, M. and Siegert, H. (1981): Distributed Systems — Architecture and Implementation. Springer Verlag, 1981.Google Scholar
  23. Louie, G., Mantei, M. and Seilen, A. (in press) “Making Contact in a Multi-Media Environment”, to appear in Behaviour and Interaction Technology.Google Scholar
  24. Mackay, W. (1991): “Ethical Issues in the Use of Video: Is it Time to Establish Guidelines?” SIGCHI Discussion Forum in Proc. ACM Conference on Human Factors in Computing Systems, CHI’91, New Orleans, Louisiana, April-May 1991, pp. 403–405.Google Scholar
  25. MacLean, A., Young, R., Bellotti, V. and Moran, T. (1991): “Questions, Options, and Criteria: Elements of a Design Rationale for user interfaces”, Human Computer Interaction, vol 6 (3&4), pp. 201–250.CrossRefGoogle Scholar
  26. Mantei, M., Becker, R., Seilen, A., Buxton, W., Milligan, T. and Wellman, B. (1991): “Experiences in the Use of a Media Space” in Proc. ACM Conference on Human Factors in Computing Systems, CHI’91, New Orleans, Louisiana, April-May 1991, pp. 203–208.Google Scholar
  27. McCarthy, J., Miles, V. and Monk, A. (1991): “An Experimental Study of Common Ground in Text-Based Communication” in Proc. ACM Conference on Human Factors in Computing Systems, CHI’91, New Orleans, Louisiana, April-May 1991, pp. 209–215.Google Scholar
  28. McGuffin, L. and Olson, G. (1992): “ShrEdit: A Shared Electronic Workspace”, CSMIL Technical Report, Cognitive Science and Machine Intelligence Laboratory, University of Michigan, 1992.Google Scholar
  29. Minneman, S. and Bly, S. (1991): “Managing à Trois: A Study of a Multi-User Drawing Tool in Distributed Design Work”, in Proc. ACM Conference on Human Factors in Computing Systems, CHI’91, New Orleans, Louisiana, April- May 1991, pp. 217–224.Google Scholar
  30. Mullender, S. (1989) “Protection”, in S. Mullender (ed.) Distributed Systems, Addison Wesley, 1989.Google Scholar
  31. Parker, D., Swope, S. and Baker, B. (1990): Ethical Conflicts in Information and Computer Science, Technology, and Business, QED, Information Sciences Inc. Wellesley, MA, 1990.Google Scholar
  32. Pedersen, E., McCall, K., Moran, T. and Halasz, F. (1993): “Tivoli: An Electronic Whiteboard for Informal Workgroup Meetings”, in Proc. INTERCHI’93, Conference on Human Factors in Computing Systems, Amsterdam, The Netherlands, April, 1993.Google Scholar
  33. Privacy Protection Study Commission (1991): “Excerpts from Personal Privacy in an Information Society” in C. Dunlop & R. Kling (eds.) Computerization and Controversy: Value Conflicts and Social Choices, Academic Press Inc., 1991, pp. 453–468.Google Scholar
  34. Richards, E. (1991): “Proposed FBI Crime Computer System Raises Questions on Accuracy, Privacy”, in C. Dunlop & R. Kling (eds.) Computerization and Controversy: Value Conflicts and Social Choices, Academic Press Inc., 1991, pp. 436–438.Google Scholar
  35. Root, R. (1988) “Design of a Multi-Media Vehicle for Social Browsing” in Proc. ACM Conference on Computer Supported Cooperative Work, CSCW’88, Portland Oregon, September 26–29, 1988, pp. 25–38.Google Scholar
  36. Stults, R. (1988): “The Experimental Use of Video to Support Design Activities”, Xerox PARC Technical Report SSL-89–19, Palo Alto, California, 1988.Google Scholar
  37. Tang, J. and Minneman, S. (1991): “VideoWhiteboard: Video Shadows to Support Remote Collaboration” in Proc. ACM Conference on Human Factors in Computing Systems, CHI’91, New Orleans, Louisiana, April-May 1991, pp. 315–322.Google Scholar
  38. Want, R., Hopper, A., Falcco, V. and Gibbons, J. (1992): “The Active Badge Location System”, ACM Transactions on Office Information Systems, January, 1992, 10(1), pp. 91–102.CrossRefGoogle Scholar
  39. Weiser, M. (1991): “The Computer for the 21st Century”, Scientific American, September, 1991, pp. 94–104.Google Scholar

Copyright information

© kluwer Academic Publishers 1993

Authors and Affiliations

  • Victoria Bellotti
    • 1
  • Abigail Sellen
    • 1
    • 2
  1. 1.Rank Xerox EuroPARCCambridgeUK
  2. 2.MRC Applied Psychology UnitCambridgeUK

Personalised recommendations